Computer Security HandbookSeymour Bosworth, M. E. Kabay John Wiley & Sons, 16/10/2002 - 1224 من الصفحات "Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt. |
من داخل الكتاب
النتائج 1-5 من 86
الصفحة 2-1
... Signatures 2.4 2.7.1 Indecent and Obscene Communications and 2.3 INTELLECTUAL PROPERTY 2.4 the U.S. Constitution 2.15 2.7.2 Communications 2.3.1 Copyright 2.4 2.3.2 Trademarks 2.9 Decency Act 2.16 2.7.3 Additional Issues Related to ...
... Signatures 2.4 2.7.1 Indecent and Obscene Communications and 2.3 INTELLECTUAL PROPERTY 2.4 the U.S. Constitution 2.15 2.7.2 Communications 2.3.1 Copyright 2.4 2.3.2 Trademarks 2.9 Decency Act 2.16 2.7.3 Additional Issues Related to ...
الصفحة 2-4
... signature acts.” These acts provide that digital signatures, when they follow the requirements of the law, are as binding and “real” as written signatures. The acts, which have been enacted at the federal level4 and by a variety of ...
... signature acts.” These acts provide that digital signatures, when they follow the requirements of the law, are as binding and “real” as written signatures. The acts, which have been enacted at the federal level4 and by a variety of ...
الصفحة 2-27
... signature and electronic transactions is extensive , it is by no means exclusive , and listings are provided for reference purposes only . 6. See , e.g. , Code of Ala . 40-30-5 ( 2000 ) . 7. 17 U.S.C. § 102 ( a ) . 8. Ibid . 9. 17 ...
... signature and electronic transactions is extensive , it is by no means exclusive , and listings are provided for reference purposes only . 6. See , e.g. , Code of Ala . 40-30-5 ( 2000 ) . 7. 17 U.S.C. § 102 ( a ) . 8. Ibid . 9. 17 ...
الصفحة 4-21
... signatures and encryption.61 4.5.5 Reported in 2000. Internet - related credit card fraud rose 29 percent in 1999 , according to the British Home Office's statistics published on the Web . 62 Cybercrime growth accounted for a major part ...
... signatures and encryption.61 4.5.5 Reported in 2000. Internet - related credit card fraud rose 29 percent in 1999 , according to the British Home Office's statistics published on the Web . 62 Cybercrime growth accounted for a major part ...
الصفحة 5-6
... signatures to authenticate documents . The severity of authenticity loss can take several forms , including lack of confor- mance to reality with no recovery possible ; moderately false or deceptive information with delayed recovery at ...
... signatures to authenticate documents . The severity of authenticity loss can take several forms , including lack of confor- mance to reality with no recovery possible ; moderately false or deceptive information with delayed recovery at ...
المحتوى
PART TWO THREATS AND VULNERABILITIES | 5-23 |
PART THREE PREVENTION TECHNICAL DEFENSES | 14-27 |
PART FOUR PREVENTION HUMAN FACTORS | 24-53 |
PART FIVE DETECTION | 34-65 |
PART SIX REMEDIATION | 39-13 |
PART SEVEN MANAGEMENTS ROLE | 43-33 |
PART EIGHT OTHER CONSIDERATIONS | 47-31 |
INDEX | 1-1 |
طبعات أخرى - عرض جميع المقتطفات
عبارات ومصطلحات مألوفة
access control access control lists ActiveX allow application attacks audit authentication behavior CCEVS certificate Chapter client Common Criteria communications computer crime Computer Security copy corporate cost criminal customers damage database DDoS Denial of Service detection digital signatures document e-commerce e-mail effective electronic employees encryption equipment ethical evaluation example files firewall functions hackers identify implemented incident information security information systems infrastructure installed internal Internet issues law enforcement loss ment monitor National operating system organization packets password percent person potential problem procedures protection protocol public key reported requirements response result risk rity rootkit scan scanners secu security policies server signature specific standard target testing threats tion trust unauthorized Unix Validation vendors victim virus viruses vulnerabilities Web server worm
مقاطع مشهورة
الصفحة 2-16 - The basic guidelines for the trier of fact must be: (a) whether "the average person, applying contemporary community standards...
الصفحة 12-11 - Collections of literary or artistic works such as encyclopaedias and anthologies which by reason of the selection and arrangement of their contents constitute intellectual creations...
الصفحة 18-48 - The effect of provisions of this Act may be varied by agreement, except as otherwise provided in this Act and except that the obligations of good faith, diligence, reasonableness and care prescribed by this Act may not be disclaimed by agreement but the parties may by agreement determine the standards by which the performance of such obligations is to be measured if such standards are not manifestly unreasonable. (4) The presence in certain provisions of this Act of the words "unless otherwise agreed...
الصفحة 7-6 - Information superiority is all about getting the right information to the right people at the right time in the right format while denying adversaries the same advantages.
الصفحة 7-12 - If two or more persons conspire either to commit any offense against the United States or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.
الصفحة 12-8 - The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. The specification shall conclude with one or more claims particularly pointing out and distinctly claiming...
الصفحة 12-4 - derivative work" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work".
الصفحة 12-4 - DERIVATIVE WORK" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation or any other form in which a work may be recast, transformed, or adapted.
الصفحة 12-10 - ... a manner contrary to honest commercial practices so long as such information: (a) is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question...
الصفحة 12-6 - ... effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.